Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they...
The Secure Online Business: E-Commerce, It Functionality & Business Continuity
The Secure Online Business: E-Commerce, It Functionality & Business Continuity
The effective management of risks online is likely to be the greatest business enabler / destroyer of the next decade. Clearly, organizations that do not move to full e-commerce functionality are unlikely to flourish; whereas those that ignore cyber crime and the "dark side" of the Internet are likely to get badly burnt.

This...

MediaWiki 1.1: Beginner's Guide
MediaWiki 1.1: Beginner's Guide

MediaWiki is the free, open-source wiki engine software that powers Wikipedia and many of the other popular wikis across the Web. Written in PHP, it possesses many features that make it the engine of choice for large collaborative wikis: flexible markup, comprehensive user management, multimedia handling, and more. Whether you are creating a...

VMware Horizon Workspace Essentials
VMware Horizon Workspace Essentials

Manage and deliver a secure, unified workspace to embrace any time, any place, anywhere access to corporate apps, data, and virtual desktops securely from any device

Overview

  • Design, install, and configure a Horizon Workspace infrastructure
  • Deliver a user's workspace to mobile devices...
The Mobile Application Hacker's Handbook
The Mobile Application Hacker's Handbook

See your app through a hacker's eyes to find the real sources of vulnerability

The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward...

Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition)
Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition)

Inside Java(TM) 2 Platform Security, the definitive and comprehensive guide to the Java security platform, has been thoroughly updated to reflect key additions and revisions to Java security technologies currently in use by leading technology companies. This second edition, penned by the Java...

Automating Linux and Unix System Administration, Second Edition (Expert's Voice in Linux)
Automating Linux and Unix System Administration, Second Edition (Expert's Voice in Linux)
Whether you need a network of ten Linux PCs and a server or a datacenter with a few thousand Unix nodes, you need to know how to automate much of the installation, configuration, and standard system administration.

Build your network once using cfengine, and the network build will work, without user intervention, on any hardware you prefer....

FreePBX 2.5 Powerful Telephony Solutions
FreePBX 2.5 Powerful Telephony Solutions
FreePBX is an easy-to-use GUI that controls and manages Asterisk. It gives you pre-programmed functionality accessible through user-friendly web interfaces that allows you to have a fully functional PBX pretty much straight away with no programming. With this book it's easy to master the many features of FreePBX, which will help you to save time...
PHP & MySQL For Dummies, 4th Edition
PHP & MySQL For Dummies, 4th Edition

Here's what Web designers need to know to create dynamic, database-driven Web sites

To be on the cutting edge, Web sites need to serve up HTML, CSS, and products specific to the needs of different customers using different browsers. An effective e-commerce site gathers information about users and provides information they need...

PHP and MySQL 24-Hour Trainer
PHP and MySQL 24-Hour Trainer

PHP IS A POPULAR PROGRAMMING LANGUAGE that powers many websites. It originally started out as a way to make dynamic websites by generating HTML. Today it stands on its own as a generalpurpose programming language and is available on most web hosting sites. Because of its roots, it is very easy to insert bits and pieces of PHP inside of...

Spring Recipes: A Problem-Solution Approach
Spring Recipes: A Problem-Solution Approach

Spring Recipes: A Problem-Solution Approach, Third Edition builds upon the best-selling success of the previous editions and focuses on the latest Spring Framework features for building enterprise Java applications. This book provides code recipes for the following, found in the latest Spring:

  • Spring fundamentals:...
Using Joomla!
Using Joomla!

If you’re new to content management systems—or even new to building websites—this practical guide will get you up and running in no time. You don’t have to know much code, if any, to get started.

Need to build a website quickly? Have a client that requires a powerful website with lots of...

unlimited object storage image
Result Page: 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy